Building a Honeypot to Research CyberAttack Techniques Interim report